similar to: sshd 3.9p1 under Reliant Unix 5.45: getpeername: Operation not supported on transport endpoint

Displaying 20 results from an estimated 2000 matches similar to: "sshd 3.9p1 under Reliant Unix 5.45: getpeername: Operation not supported on transport endpoint"

2001 Aug 20
4
[PATCH] some patches for Fujitsu-Siemens ReliantUNIX, minor fixes and XXXes
Hi, attached please find some patches for ReliantUNIX. This was tested under Reliant UNIX V5.43C40 with Compiler CDSDEV V2.0C00. Here is what I did: - there is a common misunderstanding how to use /usr/libucb/libucb.a: There are some library functions only in libucb.a under ReliantUNIX, so one needs to bind it. The problem is: there are some other functions in this library you should never
2003 May 26
3
Error on Reliant Unix: no controlling terminal
Hi all, just I tried to upgrade openssh from 3.5p1 to 3.6.1p2 on Reliant Unix 5.45 and run into this error: root at soltest: tail /var/adm/log/messages .... May 23 15:45:28 soltest unix: sshd[4013]: Accepted password for root from 10.128.11.72 port 2624 ssh2 May 23 15:45:28 soltest unix: sshd[4101]: error: setsid: Not owner May 23 15:45:28 soltest unix: sshd[4101]: error: open /dev/tty failed -
2003 Sep 23
5
[Bug 710] ReliantUnix: -ldl missing when libcrypto is a shared object
http://bugzilla.mindrot.org/show_bug.cgi?id=710 Summary: ReliantUnix: -ldl missing when libcrypto is a shared object Product: Portable OpenSSH Version: -current Platform: MIPS OS/Version: other Status: NEW Severity: normal Priority: P3 Component: Build system AssignedTo:
2018 Dec 03
3
[PATCH] removing an old API.
While looking for leaks I came across two old packet APIs which are easy to remove. I'm sending patches for each separately. First, there is the packet_set_connection(int fd_in, int fd_out) function in opacket.c The function relies on a behavior in ssh_packet_set_connection() where, when it is passed a NULL pointer, it will implicitely allocate a struct ssh and return it after then set
2003 Jul 10
2
sshd also talking HTTP
(I'm not subscribed to the list, please Cc me on replies). We have configured sshd to listen on port 80 for some of our users who are behind sufficiently paranoid firewalls. However, others are now confused since they're expecting a web server on port 80. So, I created a small patch (just as proof-of-concept so far), that determines the type of client connecting. A web client will start
2020 Jan 21
3
Instrumentation for metrics
> This makes me think that the syslog approach is probably the way to go Yeah, right. Another idea is to mirror the current preauth load via setproctitle()... That makes that data accessible even without a syscall (at least the writing of the data - quering needs syscalls, right), so that can be kept up-to-date and allows a high monitoring frequency as well. Multiple instances of SSHd (on
2002 Jun 25
7
[Bug 294] tcp wrapper access changed between 2.9.9p2 and 3.3p1
http://bugzilla.mindrot.org/show_bug.cgi?id=294 ------- Additional Comments From ktaylor at daac.gsfc.nasa.gov 2002-06-26 00:53 ------- This is what's reported in the syslog from openssh-2.9.9p2 - with an ip address range listed in hosts.allow Jun 25 10:50:08 6D:server sshd[30123536]: Failed keyboard-interactive for ktaylor from xxx.xxx.xxx.xxx port 40333 ssh2 Jun 25 10:50:13 6D:server
2005 Feb 09
4
[Bug 893] With Reliant Unix (5.44/5.45) a connection fails if the host isn’t known in DNS
http://bugzilla.mindrot.org/show_bug.cgi?id=893 ------- Additional Comments From dtucker at zip.com.au 2005-02-10 10:36 ------- Created an attachment (id=814) --> (http://bugzilla.mindrot.org/attachment.cgi?id=814&action=view) Append -lresolv to LIBS early on Reliant Unix libresolv isn't checked until late in configure, and if it's needed the it's *prepended* to LIBS.
2003 Sep 25
7
[Bug 715] usage of BROKEN_SETREUID/BROKEN_SETREGID considered harmful
http://bugzilla.mindrot.org/show_bug.cgi?id=715 Summary: usage of BROKEN_SETREUID/BROKEN_SETREGID considered harmful Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: major Priority: P2 Component: Build system AssignedTo:
2001 Jan 09
0
Result: X11-Forwarding for Reliant UNIX (formerly SINIX)
Hi ! I promised to report the result to the list. Here it is: Damien Miller [SMTP:djm at mindrot.org] wrote yesterday on his keyboard: > On Mon, 8 Jan 2001, Bladt Norbert wrote: [...] >> During the last week I did some investigations why the X11 forwarding >> on Reliant UNIX Versions 5.44 and 5.45 does not work out of the box >> with OpenSSH-2.3.0p1. >> >> The
2001 Dec 11
1
Patch for ReliantUnix
Hi all, attached you find a patch for OpenSSH 3.0.2p1 configure which enables OpenSSH to again compile under ReliantUnix (due to utimes it is again needed to include /usr/ucblib/libucb.a) Sorry for not testing it before the release ;-( Best regards -- Udo Schweigert, Siemens AG | Voice : +49 89 636 42170 CT IC 3, Siemens CERT | Fax : +49 89 636 41166 D-81730 Muenchen /
2004 Jul 05
9
[Bug 893] With Reliant Unix (5.44/5.45) a connection fails if the host isn’t known in DNS
http://bugzilla.mindrot.org/show_bug.cgi?id=893 Summary: With Reliant Unix (5.44/5.45) a connection fails if the host isn?t known in DNS Product: Portable OpenSSH Version: 3.8p1 Platform: MIPS OS/Version: other Status: NEW Severity: critical Priority: P2 Component: ssh
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
Dear OpenSSH Portable sshd developers, I'm having a problem where sshd login sessions are occasionally (as often as once a day) getting stuck indefinitely. I enabled debug messages and got a backtrace of a stuck sshd, and I think I've found the bug. I wanted to run it by the list once before filing. sshd version: OpenSSH_4.2p1 FreeBSD-20050903, OpenSSL 0.9.7e-p1 25 Oct 2004
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex
2000 Jul 17
1
logout() returned an error
Hi everybody, I got the following problems, as I tried to connect from ssh (1.2.27) client to openssh (2.1.1p4) server: Client: ------- $ ssh -l user1 192.168.0.2 user1 at 192.168.0.2's password: Last login: Mon Jul 17 11.05.44 2000 from 192.168.0.1 -bash: ?Ptty3: command not found -bash: Zg9tty3: command not found connection to 192.168.0.2 closed. Server: ------- logfile-entries: Jul 17
2000 Jul 17
2
sshd -i problem under 2.1.1p4 as well
I have encountered the same problem with sshd -i (under Mandrake linux 6.1) as that described by Ben L Perkins, this time with 2.1.1p4: ... Last login: Mon Jul 17 12:04:50 2000 from orpheus.qimr.edu.au -bash: ?oe90: command not found -bash: glorious: command not found -bash: ?]r90: command not found -bash: marshall4: command not found Connection to orpheus.qimr.edu.au closed. log: Jul 17
2001 Jan 08
1
X11-Forwarding for Reliant UNIX (formerly SINIX)
Hi ! To all: A Happy New Year ! During the last week I did some investigations why the X11 forwarding on Reliant UNIX Versions 5.44 and 5.45 does not work out of the box with OpenSSH-2.3.0p1. The result fo my investigation is: 1. The OpenSSH sshd opens a TCP/IP-port 6000 + display number and listens to it. This is fine and works with Solaris 7, DEC-OSF 4.0D, Linux and FreeBSD-4.2 but not
2000 Jul 10
1
OpenSSH port to ReliantUNIX
Hi all, I just managed to get OpenSSH working on ReliantUNIX, which is the SVR4- compatible UNIX from Fujitsu-Siemens (formerly known as SNI). Patch is attached. Up to now I do not know why it does not work with IP_TOS, but I needed to switch it off. Anyway: it works here in our lab without any problems. Many thanks for OpenSSH and best regards. Udo -- Udo Schweigert, Siemens AG | Voice
2014 Jun 23
2
ListenAdress Exclusion
I was wondering what everyone's thoughts were on a simpler way to exclude addresses from having listeners on them. I know a lot of people have multiple subnets, especially larger corporations. Some networks are non-route-able, and therefor unsuitable for use with SSH, aside from communication between other servers on the same subnet. Given that we may want to exclude those non-route-able
2002 May 20
0
[Bug 252] New: Patch for use of /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=252 Summary: Patch for use of /etc/default/login Product: Portable OpenSSH Version: -current Platform: All OS/Version: Solaris Status: NEW Severity: enhancement Priority: P4 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: